期刊文献+

基于Logistic映射的社交网络敏感信息加密算法

Sensitive Information Encryption Algorithmof Social Network Based on Logistic Mapping
下载PDF
导出
摘要 为保护多种社交网络敏感信息安全,研究基于Logistic映射的社交网络敏感信息加密算法.此算法采用基于经验模态分解的社交网络信息预处理方法,以经验模态分解的方式,对复杂的社交网络信息去冗后,通过基于演化超网络的社交网络敏感信息挖掘方法,提取去冗后社交网络信息中敏感信息;由基于Logistic映射分组加密算法,生成敏感信息二进制随机序列,将其分为两部分明文,一部分明文执行置乱处理,另一部分明文执行异或运算,构建社交网络敏感信息的密文,完成社交网络敏感信息加密.实验结果表明,所提算法加密性能良好,可以有效改变文本类、图像类社交网络敏感信息,原始敏感信息特征完全改变,可保护多种社交网络敏感信息安全. In order to protect the security of various social network sensitive information,the encryption algorithm of social network sensitive information based on Logistic mapping is studied.This algorithm adopts the social network information preprocessing method based on empirical mode decomposition.After removing the redundancy of complex social network information in the way of empirical mode decomposition,it extracts the sensitive information from the redundant social network information through the social network sensitive information mining method based on evolutionary hypernetwork.After generating the binary random sequence of sensitive information based on the Logistic mapping block encryption algorithm,it is divided into two parts of clear text,one part of which is scrambled,and the other part of which is XOR,to construct the ciphertext of sensitive information of social network and complete the encryption of sensitive information of social network.The experimental results show that the proposed algorithm has good encryption performance,can effectively change the text and image sensitive information of social networks,and the original sensitive information features are completely changed,which can protect the security of various social network sensitive information.
作者 杨洋 YANG Yang(Anhui Vocational College of Police Officers,Hefei 230031,China)
出处 《兰州文理学院学报(自然科学版)》 2024年第2期51-55,共5页 Journal of Lanzhou University of Arts and Science(Natural Sciences)
基金 安徽省2020年省级质量工程(2020zyq26) 安徽省2020年省级质量工程(2020szsfkc0315)。
关键词 LOGISTIC映射 社交网络 敏感信息 加密算法 演化超网络 信息挖掘 Logistic mapping social network sensitive information encryption algorithm evolutionary hypernetwork information mining
  • 相关文献

参考文献10

二级参考文献42

共引文献90

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部